Your browser lacks required capabilities. Please upgrade it or switch to another to continue.

Loading…

<span class="subtitle">EVERYDAY ENCRYPTION</span>
This game is about the everyday choices you make about your security, and the role encryption plays in those choices. Digital security is always about making compromises and tradeoffs--what do you want to protect, and from whom? You can never be 100 percent secure, but encryption can help reduce your digital security risks.
<p class="button">[[ENTER|Intro]]</p><h2>Part 1: Encrypted Device</h2>
In this story, Fei has an encrypted phone.
This means that if her device is stolen or lost, it would be difficult for someone to download and see the data on her phone.
<span class="risk"> RISK:</span> However, she isn’t using an encrypted messaging app and she primarily uses services that don't use encryption in transit. This means that messages she sends can be read by someone looking at the traffic between her and the site or person she is communicating with.
<p class="button">[[GOT IT|1Day1-1-v2]]</p><div class="headerr"><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-1.png"]]</span><h1>Part 1: Encrypted Device <span tooltip="Device encryption protects the data stored on your device by scrambling that data into a format that can only be read if you have the right key." tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1></div><br/><br/><span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/2_Scene.jpg"]]</span><p class="text">
Fei was working on her laptop in a coffee shop and forgot her phone when she left to go home, and now a stranger has her phone.
Since her phone is encrypted, though, it is less likely that snoops can get into her phone and access those pictures.
<div><span class="back-button">[[< BACK|1Day1-1-v2]]</span><p class="button">[[CONTINUE|1Day1-4-v2]]</p></div>
</p><span class="subtitle">Finished Part 1. <b>Great job!</b></span>
Let's review how encryption did or could have protected Fei during this story:
1. Since she doesn't use encrypted messaging or services with encryption in transit, she was very careful not to share sensitive pictures over the internet or unsecured chat.
2. Her phone was stolen but it was encrypted, so the thief could not access her private photos.
3. She was alert and didn’t share her photos with an unknown number.
<i style="color:white !important;">Trigger warning: Part 2 includes depictions of domestic violence.</i>
<p class="button">[[START PART 2|Character2]]</p><p class="button">[[START PART 3|Character3]]</p><p class="button">[[BONUS ROUND|Final]]</p><p class="button">[[START OVER|Start]]</p>
<span class="back-button">[[< BACK|1Day1-4-v2]]</span><div class="headerr"><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-2.png"]]</span><h1>Part 2: Encrypted Phone + Encryption in Transit <span tooltip="Device encryption protects the data stored on your device by scrambling that data into a format that can only be read if you have the right key. Encryption in transit means that your data is protected when you're browsing the web. " tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1></div><br/><br/><span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/4_Scene.jpg"]]</span><p class="text">
Fei has been living with a new partner for the past six months, but she has grown increasingly concerned by her partner's abusive and controlling behavior. She has been talking to her friends about leaving, but she's really worried about what her partner will do if she leaves.
Her partner has been known to look over her shoulder while she emails and texts, so Fei is especially cautious about how she communicates with her friends. Her partner is also very tech savvy.
<div><span class="back-button">[[< BACK|Character2]]</span><p class="button">[[CONTINUE|2Day2-2]]</p></div>
</p><div class="headerr"><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-2.png"]]</span><h1>Part 2: Encrypted Phone + Encryption in Transit <span tooltip="Device encryption protects the data stored on your device by scrambling that data into a format that can only be read if you have the right key. Encryption in transit means that your data is protected when you're browsing the web. " tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1></div><br/><br/><span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/5B_Scene.jpg"]]</span><p class="text">Fei decides she needs to leave the abusive situation as soon as possible. How does she gather information to make her plan to leave?
<ul><li><div class="quest"><span class="read-more"><<click "Searching on the internet at the library">><<toggleclass "#section1" "hidden">><</click>></span><div id="section1" class="hidden" class="content"><br/><i>That was a <b style="color:black;">safer</b> choice. Fei doesn't realize it, but her partner has been monitoring all the traffic going through their internet router, so searching at the library is safer.
</i><br/>
<div class="cont"><p class="continue-button">[[CONTINUE|2Day2-6]]</p></div></div><br/></div><br/></li>
<li><div class="quest"><span class="read-more"><<click "Searching on the internet at home">><<toggleclass "#section2" "hidden">><</click>></span><div id="section2" class="hidden" class="content"><br/><i>That was a <b style="color:black;">riskier</b> choice than going to the library. Her partner has been monitoring all the traffic going through their internet router. Since Fei's traffic is encrypted, her search history is more private. But encryption doesn’t prevent her partner from seeing if she visited a domestic violence resources site, even if the sub-pages she visits are shielded from snooping. </i><br/>
<div class="cont"><p class="continue-button">[[CONTINUE|2Day2-6]]</p></div></div><br/></div><br/></li>
<li><div class="quest"><span class="read-more"><<click "Messaging her sister for advice">><<toggleclass "#section3" "hidden">><</click>></span><div id="section3" class="hidden" class="content"><br/><i>That was a <b style="color:red;">risky</b> choice. Fei doesn't realize it, but her partner has been monitoring all the traffic going through their internet router. Since she doesn't have encrypted messaging and she was using the Wifi at home, he could read her messages to her sister. Her partner saw that she was making plans to leave and confronted her. Try again.</i></div><br/></div><br/></li></ul>
<span class="back-button">[[< BACK|2Day2-1]]</span>
</p><div class="headerr"><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-3.png"]]</span><h1>Part 2: Encrypted Phone + Encryption in Transit <span tooltip="Device encryption protects the data stored on your device by scrambling that data into a format that can only be read if you have the right key. Encryption in transit means that your data is protected when you're browsing the web. " tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1></div><br/><br/><span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/6_Scene.jpg"]]</span><p class="text">
Even with her cautious behavior, Fei notices that her partner has been acting more suspicious lately, and she decides to leave. Fei finds a shelter, but when her partner shows up in the shelter parking lot, Fei is stunned. She knows she took all the right steps to protect herself, so she is struggling to figure out how her partner knew where to find her. He threatens her, but luckily a bystander calls security and he flees in the car.
Fei realizes that her partner was acting suspicious because he had discovered her plans somehow, in spite of all the steps she had taken to stay secure. She moves into the shelter, but feels much less confident about her safety.
<div><span class="back-button">[[< BACK|2Day2-2]]</span><p class="button">[[CONTINUE|2Day2-7]]</p></div>
</p><div class="headerr"><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-4.png"]]</span><h1>Part 2: Encrypted Phone + Encryption in Transit <span tooltip="Device encryption protects the data stored on your device by scrambling that data into a format that can only be read if you have the right key. Encryption in transit means that your data is protected when you're browsing the web. " tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1></div><br/><br/><span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/7A_Scene.jpg"]]</span><p class="text">
Deeply concerned about her security and safety, Fei consults experts at the shelter. The experts say that they have seen this kind of behavior before, and they recommend that she have her phone analyzed to make sure her partner hasn't tampered with it. What does she do?
<ul><li><div class="quest"><span class="read-more"><<click "Buys a new phone">><<toggleclass "#section1" "hidden">><</click>></span><div id="section1" class="hidden" class="content"><br/><i>That could have been a <b style="color:black;">safer</b> choice, but there's still some risk.</i>
Fei decides to buy a new phone, but she doesn’t realize that her partner had guessed her password and secretly installed spyware on her old phone right before she left. It was transferred with the rest of her data when she set up her new phone and continues to run quietly in the background. She tries to move to another shelter, but her partner follows her and continues to threaten her. Try again.</div><br/></div><br/></li>
<li><div class="quest"><span class="read-more"><<click "Gets device checked">><<toggleclass "#section2" "hidden">><</click>></span><div id="section2" class="hidden" class="content"><br/><i>That was the <b style="color:black;">safer</b> choice. Fei probably shouldn't be using her phone until she gets it checked.</i>
The shelter refers her to a service that can analyze her phone, so she sends her phone for analysis. When the report comes back a week later, it shows that her partner had guessed her password and secretly installed spyware on her phone right before she left. It runs quietly in the background of her phone and is difficult to locate.
Unfortunately, encryption can’t protect Fei’s data if her phone has been compromised by spyware or if someone can guess her password. <div class="cont"><p class="continue-button">[[CONTINUE|2Day2-9]]</p></div></div><br/></div><br/></li>
<li><div class="quest"><span class="read-more"><<click "Continues using phone">><<toggleclass "#section3" "hidden">><</click>></span><div id="section3" class="hidden" class="content"><br/><i>That was a <b style="color:red;">risky</b> choice.</i> Fei decides to keep using her phone and move to another place, but her partner shows up just as she's arriving at the new shelter. She changes her number and moves again, but he continues to stalk and threaten her. Try again.</div></div><br/></li></ul>
<span class="back-button">[[< BACK|2Day2-6]]</span>
</p><div class="headerr"><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-4.png"]]</span><h1>Part 2: Encrypted Phone + Encryption in Transit <span tooltip="Device encryption protects the data stored on your device by scrambling that data into a format that can only be read if you have the right key. Encryption in transit means that your data is protected when you're browsing the web. " tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1></div><br/><br/><span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/7A_Scene.jpg"]]</span><p class="text">
Fei realizes that the password to her phone was something anyone who knew her could have guessed: her birth year. She changes all of her passwords for her online accounts, just in case he was monitoring them, too.
<div><span class="back-button">[[< BACK|2Day2-7]]</span><p class="button">[[CONTINUE|2Day2-Summary2A]]</p></div>
</p><span class="subtitle">Finished Part 2. <b>Great job!</b></span>
Let's review how encryption did or could have protected Fei during this story:
1. Since she doesn't use encrypted messaging, she took precautions and was careful about how and where she made plans to leave.
2. Her web searches at home and at the library were partly protected by encryption.
3. Her ex had physical access to her phone but her phone is encrypted and password-protected.
However, because Fei was using a weak password that her ex could guess, he was able to get into her phone and install spyware.
<p class="button">[[START PART 3|Character3]]</p>
<p class="button">[[BONUS ROUND|Final]]</p><p class="button">[[START OVER|Start]]</p>
<span class="back-button">[[< BACK|2Day2-9]]</span><div class="headerr"><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-6.png"]]</span><h1>Part 3: Encryption in Transit + Encrypted Messaging <span tooltip="Encryption in transit means that your data is protected when you're browsing the web. Encrypted messages can only be read by those who have the encryption key to unscramble them. End-to-end encryption means that only the person who sends a message and the recipient have the key." tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1></div><br/><br/><span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/8_Scene.jpg"]]</span><p class="text">Today, members of Fei's activist community are planning to attend a political protest for a cause that she is passionate about. Her government's security forces are known for surveilling and censoring the population during mass protests in her city. Since Fei is a vocal activist in her community, she may be directly targeted by law enforcement.
How does she communicate with her friends to organize the protest?
<ul><li><div class="quest"><span class="read-more"><<click "Using her messaging app">><<toggleclass "#section1" "hidden">><</click>></span><div id="section1" class="hidden" class="content"><br/><i>That was probably the <b style="color:black;">safer</b> choice. Fei has been communicating with some of her friends for days about the protest, and they all use end-to-end encrypted messaging.</i>
The government is deeply concerned about this protest and they have increased digital surveillance. However, authorities can’t read Fei’s encrypted messages, nor ask the messaging app company to disclose them in unencrypted form.<br/><div class="cont"><p class="continue-button">[[CONTINUE|3Day3-5]]</p></div></div><br/></div><br/></li>
<li><div class="quest"><span class="read-more"><<click "Using an online email provider">><<toggleclass "#section2" "hidden">><</click>></span><div id="section2" class="hidden" class="content"><br/><i>That was probably the <b style="color:black;">safer</b> choice, but there is still some risk.</i>
Fei has been communicating with some of her friends for days about the protest by email, which uses encryption in transit.
The government is deeply concerned about this protest and they are actively surveilling unencrypted web traffic. However, the emails are not encrypted end-to-end, so the authorities could still ask her email provider to turn over the content of her emails in unencrypted form. <div class="cont"><p class="continue-button">[[CONTINUE|3Day3-5]]</p></div></div><br/></div><br/></li>
<li><div class="quest"><span class="read-more"><<click "On social media">><<toggleclass "#section3" "hidden">><</click>></span><div id="section3" class="hidden" class="content"><br/><i>That was a <b style="color:red;">risky</b> choice.</i>
The government has been surveilling web traffic, intercepting messages, and monitoring social media to figure out who is organizing the protest. While her social media service offers encryption in transit, Fei posted on social media under her real name. Law enforcement agents see Fei's post and pick her up for questioning. Try again.</div></div><br/></li></ul>
<span class="back-button">[[< BACK|Character3]]</span>
</p><div class="headerr"><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-7.png"]]</span><h1>Part 3: Encryption in Transit + Encrypted Messaging <span tooltip="Encryption in transit means that your data is protected when you're browsing the web. Encrypted messages can only be read by those who have the encryption key to unscramble them. End-to-end encryption means that only the person who sends a message and the recipient have the key." tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1></div><br/><br/><span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/9_Scene.jpg"]]</span><p class="text">
By now the protest has begun and government authorities are actively attempting to shut it down. Fei is getting ready to leave. She really wants to document what happens at the protest with photos and video. Does she bring her phone?
<ul><li><div class="quest"><span class="read-more"><<click "Yes">><<toggleclass "#section1" "hidden">><</click>></span><div id="section1" class="hidden" class="content"><br/><i>That was a hard choice. Since her phone isn't encrypted, if law enforcement confiscated her phone at the protest they would be able to get all the data off the phone, including her contacts and evidence that might be used to prosecute Fei. Security agents can also track her location through her phone, even if they do not confiscate it. </i><br/><div class="cont"><p class="continue-button">[[CONTINUE|3Day7b]]</p></div></div><br/></div><br/></li>
<li><div class="quest"><span class="read-more"><<click "No">><<toggleclass "#section2" "hidden">><</click>></span><div id="section2" class="hidden" class="content"><br/><i>That was probably a <b style="color:black;">safer</b> choice. Since her phone isn't encrypted, if law enforcement confiscated her phone at the protest they would be able to get all the data off the phone.</i><div class="cont"><p class="continue-button">[[CONTINUE|3Day3-7a]]</p></div></div></div><br/></li></ul><br/>
<span class="back-button">[[< BACK|3Day3-1]]</span>
</p><div class="headerr"><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-7.png"]]</span><h1>Part 3: Encryption in Transit + Encrypted Messaging <span tooltip="Encryption in transit means that your data is protected when you're browsing the web. Encrypted messages can only be read by those who have the encryption key to unscramble them. End-to-end encryption means that only the person who sends a message and the recipient have the key." tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1></div><br/><br/><span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/9_Scene.jpg"]]</span><p class="text">
At the protest, Fei witnesses a security officer beating an activist. No one else has recorded it and Fei doesn't have her phone to document what has happened.
Leaving her phone at home prevents security agents from tracking her, but it also means that she can’t document any police violence that may occur at the protest.
A week after the protest, more stories emerge about violence at the protest between security forces and protesters. Fei tries to sound the alarm about the incident she witnessed, but she doesn't have evidence to back up her story.
<div><span class="back-button">[[< BACK|3Day3-5]]</span><p class="button">[[CONTINUE|3Day3-8a]]</p></div>
</p><span class="subtitle">Finished Part 3. <b>You've unlocked the bonus round!</b></span>
Let's review how encryption did or could have protected Fei:
1. Since she uses encrypted messaging, Fei heard about the protest and coordinated with fellow activists days in advance without being monitored.
2. Since she and other activists were using encrypted messaging, their information wasn't handed over to authorities.
However, she didn't bring her phone to the protest and couldn't document what was happening.
Security is always about trade-offs and compromises that can sometimes have serious consequences, but you've helped Fei stay secure and safe.
<p class="button">[[START BONUS ROUND|Final]]</p><p class="button">[[START OVER|Start]]</p>
<span class="back-button">[[< BACK|3Day3-8a]]</span><div class="headerr"><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-7.png"]]</span><h1>Part 3: Encryption in Transit + Encrypted Messaging <span tooltip="Encryption in transit means that your data is protected when you're browsing the web. Encrypted messages can only be read by those who have the encryption key to unscramble them. End-to-end encryption means that only the person who sends a message and the recipient have the key." tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1></div><br/><br/><span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/10_Scene.jpg"]]</span><p class="text">
Fei is carefully recording as riot police charge at peaceful protesters and beat them with batons. An officer spots her and demands she hand over her phone. She complies, and because her phone is not encrypted the authorities are able to get all the data from her phone.
<div><span class="back-button">[[< BACK|3Day3-5]]</span><p class="button">[[CONTINUE|3Day8b]]</p></div>
</p><div class="headerr"><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-7.png"]]</span><h1>Part 3: Encryption in Transit + Encrypted Messaging <span tooltip="Encryption in transit means that your data is protected when you're browsing the web. Encrypted messages can only be read by those who have the encryption key to unscramble them. End-to-end encryption means that only the person who sends a message and the recipient have the key." tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1></div><br/><br/><span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/10_Scene.jpg"]]</span><p class="text">
Since she was cautious and made all her plans over encrypted channels, Fei may be safe. But because authorities have her phone, they may be able to access her messages in unencrypted form.
It’s not Fei’s fault that law enforcement is infringing on citizens’ rights by surveilling protesters. But unfortunately authorities arrested several of Fei’s friends based on information authorities could access on her phone.
<div><span class="back-button">[[< BACK|3Day7b]]</span><p class="button">[[CONTINUE|Summary3B]]</p></div>
</p><span class="subtitle">Finished Part 3. <b>You've unlocked the bonus round!</b></span>
Let's review how encryption did or could have protected her:
Since she has encrypted messaging, Fei heard about the protest and coordinated with fellow activists days in advance without being monitored.
However, Fei brought her unencrypted phone to the protest and the government seized it and accessed her data and contacts. Her friends were picked up by the authorities because of what they found on her phone.
Security is always about trade-offs and compromises that can sometimes have serious consequences, but you've helped Fei stay secure and safe.
<p class="button">[[START BONUS ROUND|Final]]</p><p class="button">[[START OVER|Start]]</p>
<span class="back-button">[[< BACK|3Day8b]]</span><span>You will guide <b>Fei</b> through three stories, where she has access to a different set of encryption tools:</span><br/>
An <b style="font-family: 'MetaPro-Bold',sans-serif !important; font-size:1.15em;">encrypted phone</b> protects the data stored on your phone.
<span class="read-more"><<click "READ MORE >">><<toggleclass "#section1" "hidden">><</click>></span>
<div id="section1" class="hidden" class="content"><i>Device encryption protects the data stored on your device by scrambling that data into a format that can only be read if you have the right key. If you use a phone or laptop that isn't encrypted, someone could steal it and download the unencrypted data, sometimes even without knowing your password.
Encryption is so important that many phone makers encrypt our devices by default. If you're using an Android or an iPhone, your phone may already have disk encryption.
For more information on device encryption and how to keep your data safe, click <a href="https://ssd.eff.org/en/module/keeping-your-data-safe" id="click-here" target="_blank"><b>here</b>.</a></i></div>
<b style="font-family: 'MetaPro-Bold',sans-serif !important; font-size:1.15em;">Encryption in transit</b> protects data as it moves from your device to the websites you visit, no matter what kind of device you’re using.
<span class="read-more"><<click "READ MORE >">><<toggleclass "#section2" "hidden" class="content">><</click>></span>
<div id="section2" class="hidden"><i>Encryption in transit means that your data is protected when you're browsing the web. Every time you use the internet, information flows from your device to the websites you visit. Websites that provide encryption in transit ensure that the information you send or access over the internet can only be read if you have the right key. However, this kind of encryption only partially shields your online activity. A snooper can still see that you checked your bank website or cloud photo storage service, even if they can’t see what you did on the site.
Your browsing habits can reveal a lot of sensitive information about you--your political leanings, your mental health, who your friends and family are. Without encryption in transit, your internet service provider, the government, and potentially others can snoop on your browsing, and you could be more vulnerable to cybercriminals and malicious hackers.
Encryption in transit is quickly becoming the default standard, with more than half of all websites supporting it. If you see an HTTPS and a tiny green lock next to a URL, your web traffic is most likely encrypted in transit.
For more information on encryption in transit and how to browse the internet more securely, click <a href="https://www.wired.com/2017/01/half-web-now-encrypted-makes-everyone-safer/" id="click-here" target="_blank"><b>here.</b></a></i></div>
<b style="font-family: 'MetaPro-Bold',sans-serif !important; font-size:1.15em;">End-to-end encrypted messages</b> can only be read by the person who sends them and the person they send them to.
<span class="read-more"><<click "READ MORE >">><<toggleclass "#section3" "hidden" class="content">><</click>></span>
<div id="section3" class="hidden"><i>Encrypted messages can only be read by those who have the encryption key to unscramble them. End-to-end encryption means that only the person who sends a message and the recipient have the key. No one else can decrypt and read the message--not even the company that owns the messaging app.
Protecting messages has become so important that many popular apps already use end-to-end encryption. If you are using apps like WhatsApp or iMessage, chances are you’re already using end-to-end encrypted messaging by default.
To learn more about end-to-end encryption and messaging, click <a href="https://www.eff.org/deeplinks/2018/03/thinking-about-what-you-need-secure-messenger" id="click-here" target="_blank"><b>here</b>.</a></i></div>
<div><span class="back-button">[[< BACK|Intro]]</span><p class="button-2">[[START|Character1]]</p></div>
<h2>Final Challenge: Weakened Encryption</h2>
Encryption helps protect against malicious hacking, harms from the theft of a phone, harassment, and other behavior. But because it also sometimes thwarts state surveillance, some governments are telling companies to build a backdoor into encryption tools so that authorities can keep monitoring citizens in the name of security.
What is a backdoor? It's when companies intentionally build into their products a way to break or get around the encryption, so that governments can have access to unencrypted information.
Some companies have resisted government calls for weakening encryption. Backdoors would put us all at huge risk. If there's a weakness built into our technologies, then anyone--including criminals and stalkers --could exploit that weakness and access our information.
<p class="button">[[GOT IT|Final1]]</p><h2>Final Challenge: Weakened Encryption</h2>
In this story, Fei has access to all three types of encryption--an encrypted device, encryption in transit, and encrypted messaging.
Here's the catch: She lives in a country that has forced companies to build a backdoor into all their encryption. That means that the government and potentially other tech-savvy people, including criminals, can decrypt the data on her phone and her messages. The government has also undermined encryption used to protect her web traffic, which could allow officials see what she does online.
<div><p class="button">[[GOT IT|4Day1-1]]</p></div><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-7.png"]]</span><h1>Final Challenge: Weakened Encryption <span tooltip="Weakened encryption means that web traffic could be seen by anyone, messages can be intercepted and read by anyone, and anyone could get information off of an unencrypted device." tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1><br/><br/><span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/1_Scene.jpg"]]</span><p class="text">
Fei is in a relationship with a loving partner she trusts with her private information. She and her partner travel often, and they occasionally share intimate photos with each other.
How does she share the photos?
<ul><li><div class="quest"><span class="read-more"><<click "Messages her partner the photos">><<toggleclass "#section1" "hidden">><</click>></span><br/><div id="section1" class="hidden" class="content"><br/><i>It doesn't matter what Fei chose.</i> Even though Fei is using encryption for all three of those choices, with a backdoor built into her encrypted technologies, she can't be sure her photos or messages won’t be decrypted and compromised.
Later that day, the company that owns the popular encrypted messaging app she used announces that there was a massive data breach. It turns out that a hacker was able to exploit the encryption backdoor and her private photos were part of the leak.
<br/></div></div><br/></li>
<li><div class="quest"><span class="read-more"><<click "Uploads photos to a cloud-based app">><<toggleclass "#section2" "hidden">><</click>></span><div id="section2" class="hidden" class="content"><br/><i>It doesn't matter what Fei chose.</i> Even though Fei is using encryption for all three of those choices, with a backdoor built into her encrypted technologies, she can't be sure her photos or messages won’t be decrypted and compromised.
Later that day, the company that owns the cloud-based app she used announces that there was a massive data breach. It turns out that a hacker was able to exploit the encryption backdoor and her private photos were part of the leak.
</div><br/></div><br/></li>
<li><div class="quest"><span class="read-more"><<click "Takes photos of her partner and stores them only on her phone">><<toggleclass "#section3" "hidden">><</click>></span><div id="section3" class="hidden" class="content"><br/><i>It doesn't matter what Fei chose.</i> Even though Fei is using encryption for all three of those choices, with a backdoor built into her encrypted technologies, she can't be sure her photos or messages won’t be decrypted and compromised.
Later that day, a hacker was able to steal her phone and exploit the encryption backdoor, leaking her private photos.
</div></div><br/></li></ul>
<div class="cont"><p class="button">[[CONTINUE|4Day3-1]]</p></div>
<span class="back-button">[[< BACK|Final1]]</span>
</p><div class="headerr"><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-9.png"]]</span><h1>Final Challenge: Weakened Encryption <span tooltip="Weakened encryption means that web traffic could be seen by anyone, messages can be intercepted and read by anyone, and anyone could get information off of an unencrypted device." tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1></div><br/><br/><span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/8_Scene.jpg"]]</span><p class="text">
Today, members of Fei's activist community are planning to attend a political protest for a cause that she is passionate about. Her government's security forces are known for surveilling and censoring the population during mass protests in her city.
How does she communicate with her friends to organize the protest?
<ul><li><div class="quest"><span class="read-more"><<click "By message">><<toggleclass "#section1" "hidden">><</click>></span><div id="section1" class="hidden" class="content"><br/><i>You probably guessed the answer: It doesn't matter what Fei chose.</i> Because the government is deeply concerned about this protest, they are actively surveilling and decrypting messages to determine who will be involved. Even though Fei is using all three kinds of encryption, other people can read her communications.
</div><br/></div><br/></li>
<li><div class="quest"><span class="read-more"><<click "In a secure email">><<toggleclass "#section2" "hidden">><</click>></span><div id="section2" class="hidden" class="content"><br/><i>You probably guessed the answer: It doesn't matter what Fei chose.</i> Because the government is concerned about this protest, they are actively surveilling and decrypting emails to determine who will be involved. Even though Fei is using all three kinds of encryption, other people can read her communications.
</div><br/></div><br/></li>
<li><div class="quest"><span class="read-more"><<click "On social media">><<toggleclass "#section3" "hidden">><</click>></span><div id="section3" class="hidden" class="content"><br/><i>You probably guessed the answer: It doesn't matter what Fei chose.</i> Because the government is deeply concerned about this protest, they are actively surveilling social media posts to determine who will be involved. Even though Fei is using all three kinds of encryption, other people can read her communications.
</div></div><br/></li></ul>
<div class="cont"><p class="button">[[CONTINUE|4Summary]]</p></div>
<span class="back-button">[[< BACK|4Day1-1]]</span>
</p><span class="subtitle"><b>You're finished!</b></span>
It's nearly impossible for Fei to stay safe when technology has been intentionally compromised, even though she tried to protect her data and communications. There are very few choices she could have made that would have prevented her from being exposed to harm because her data was read or stolen.
Let's review what happened to Fei:
1. Even though she used encryption to share private photos, a malicious hacker found and used the encryption backdoors that the government forced companies to build. Her messages and photos were leaked online.
2. Security forces used the encryption backdoor to access her unencrypted communications and used them to threaten and intimidate activists like Fei.
<p class="button">[[CONCLUSION|Conclusion]]</p><h2>Conclusion</h2>
Even though digital security is all about trade-offs and compromises, it's nearly impossible to stay safe when our technologies have a built-in vulnerability that allows malicious actors to read your data or hack into your phone.
Human rights officials <u><a href="https://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=17138" target="_blank" id="click-here">recognize</a></u> that encryption tools save lives. Yet some governments continue to insist that tech companies weaken encryption by building a backdoor so law enforcement can access our unencrypted data.
We should question and oppose such backdoor proposals. Governments should not be subverting the security tools that protect us every day.
<p class="button">[[RESOURCES|Resources]]</p><h2>Part 2: Encrypted Phone + Encryption in Transit</h2>
In this story, Fei has both an encrypted phone AND only uses services that provide encryption in transit.
This means that if her phone gets stolen or lost, it would be difficult for someone to download her phone’s data.
She is using encryption in transit, which means she can browse the internet on her phone without having what she does on those websites read by someone watching the web traffic between her and the site.
<span class="risk"> RISK:</span> However, she isn’t using an encrypted messaging app, and her messaging app does not provide encryption in transit. This means that the messages she sends can be read by someone looking at the web traffic between her and the person she is communicating with.
<span class="risk"> RISK:</span> Fei has a password that her friends and family could easily guess.
<p class="button">[[GOT IT|2Day2-1]]</p><h2>Part 3: Encryption in Transit + Encrypted Messaging</h2>
In this story, Fei uses encrypted messaging AND only uses services that provide encryption in transit. But her phone is not encrypted by default.
She is using a messaging app that is end-to-end encrypted, which means that the messages she sends cannot be read by someone watching the traffic between her and the person she is communicating with, not even the app maker.
She only uses services that provide encryption in transit. This means that she can browse the internet on her phone without having her information read by someone watching the web traffic between her and the site.
<span class="risk">RISK:</span> If her device gets stolen or lost, someone could easily download the data off her phone.
<p class="button">[[GOT IT|3Day3-1]]</p><span class="subtitle">What does encryption do?</span>
Encryption technologies help you keep data private.
<span class="subtitle">Who uses encryption?</span>
Just about everyone, whether they realize it or not. Encryption can be used to protect not only our financial information and passwords, but also our cell phone conversations, our connected devices, and our laptops. It protects the basic infrastructure of our communications network and power grid.
<span class="subtitle">How does encryption work?</span>
Encryption scrambles text so that it cannot be read unless you have the “keys” to decode it. It's become so important to our security that encryption is often the default for our devices, our web traffic, and our messages. Lots of companies--from phone makers to email providers to cloud storage services--use encryption. We should question government efforts to weaken or break into encrypted communications. We have a right to know if a government has subverted the security tools we rely on every day.
<div><span class="back-button">[[< BACK|Start]]</span><p class="button-1">[[PLAY THE GAME|Primer]]</p></div><h2>Resources</h2>
<a href="https://www.hrw.org/tag/encryption" id="click-here" target="_blank">Read more about Human Rights Watch's work on <u>encryption.</u></a>
If you have been affected by the issues raised in this game, or would like more information about domestic violence, the resources below may help:
<ul><li><a href="https://ssd.eff.org/" id="click-here" target="_blank"><u>Defending yourself</u> against different types of surveillance</a></li>
<li><a href="https://hackblossom.org/domestic-violence/" id="click-here" target="_blank">DIY <u>guide</u> for cybersecurity and domestic violence</a></li>
<li><a href="https://chayn.gitbooks.io/advanced-diy-privacy-for-every-woman/content/" id="click-here" target="_blank">Advanced <u>DIY privacy</u> for women</a></li>
<li><a href="https://digitalrightsfoundation.pk/services/" id="click-here" target="_blank"><b>A guidebook on <u>cyberharassment</u> for women</b></a></li>
</ul>
<i style="color:white !important;">Please contact a domestic violence organization if you need immediate support.</i>
<p class="button">[[START OVER|Start]]</p><div class="headerr"><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-0.png"]]</span><h1>Part 1: Encrypted Device <span tooltip="Device encryption protects the data stored on your device by scrambling that data into a format that can only be read if you have the right key." tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1></div><br/><br/>
<span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/1_Scene.jpg"]]</span><p class="text">
Fei is in a relationship with a loving partner whom she trusts with her private information. She and her partner travel often, and they occasionally share intimate and sensitive photos with each other.
How does she share those photos?
<ul><li><div class="quest"><span class="read-more"><<click "Messages her partner the photos">><<toggleclass "#section1" "hidden">><</click>></span><div id="section1" class="hidden" class="content"><br/><i>That was a <b style="color:red;">risky</b> choice. Someone was monitoring traffic on the public WiFi network Fei was using and he was able to grab Fei's intimate photos.Try again.</i></div><br/></div><br/></li>
<li><div class="quest"><span class="read-more"><<click "Uploads photos to a cloud-based app">><<toggleclass "#section2" "hidden">><</click>></span><div id="section2" class="hidden" class="content"><br/><i>That was a <b style="color:red;">risky</b> choice. Someone was monitoring traffic on the public WiFi network Fei was using when she uploaded her photos and he was able to grab them. The cloud storage company also suffered a data breach, and Fei's photos were also leaked online. Try again.</i></div><br/></div><br/></li>
<br/><li><div class="quest"><span class="read-more"><<click "Her partner takes photos and stores them only on Fei’s phone">><<toggleclass "#section3" "hidden">><</click>></span><div id="section3" class="hidden" class="content"><br/><i> That was the <b style="color:black;">safer</b> choice. Since Fei doesn't use encrypted messaging or services that have encryption in transit, sending sensitive pictures over the internet or in a message is risky.</i><br/>
Later that day, the company that owns a popular non-secure messaging app announces that there was a massive data breach. Many of its customers had their private messages leaked publicly. Since Fei didn't send her images over the app, her data is safe.<br/>
<div class="cont"><p class="continue-button">[[CONTINUE|1Day1-3]]</p></div></div></div><br/></li></ul>
<span class="back-button">[[< BACK|Character1]]</span>
</p><div class="headerr"><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-1.png"]]</span><h1>Part 1: Encrypted Device <span tooltip="Device encryption protects the data stored on your device by scrambling that data into a format that can only be read if you have the right key." tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1></div><br/><br/><span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/3A_Scene.jpg"]]</span><p class="text">
Now Fei has to buy a new phone. She doesn't have anyone's phone numbers on her new phone yet. While she's getting ready for bed, she gets a text from her partner asking for an intimate picture. Does she send it?
<ul><li><div class="quest"><span class="read-more"><<click "Yes">><<toggleclass "#section1" "hidden">><</click>></span><div id="section1" class="hidden" class="content"><br/><i>That was a <b style="color:red;">risky</b> choice. It turns out the text Fei had received was from a guy impersonating her partner.</i>
Encryption can protect from some dangers, but you should also practice safe online behaviors, like verifying the identity of any unknown contacts. Try again.</div><br/></div><br/></li>
<li><div class="quest"><span class="read-more"><<click "No">><<toggleclass "#section2" "hidden">><</click>></span><div id="section2" class="hidden" class="content"><br/><i>That was the <b style="color:black;">safer</b> choice. Since Fei hadn't updated her contacts and didn't back up her contacts list to transfer to her new phone, she wasn't sure it was actually her partner. It turns out the text Fei had received was from a guy grabbing pictures to blackmail people.</i><br/>
<div class="cont"><p class="continue-button">[[CONTINUE|1Day1-Summary1]]</p></div></div></div><br/></li></ul>
<span class="back-button">[[< BACK|1Day1-3]]</span>
</p><div class="headerr"><span class="progressbar">[img["https://features.hrw.org/features/features/encryption/assets/bar-7.png"]]</span><h1>Part 3: Encryption in Transit + Encrypted Messaging <span tooltip="Encryption in transit means that your data is protected when you're browsing the web. Encrypted messages can only be read by those who have the encryption key to unscramble them. End-to-end encryption means that only the person who sends a message and the recipient have the key." tooltip-position="buttom" class="icon-icon">[img["https://features.hrw.org/features/features/encryption/assets/question.png"]]</span></h1></div><br/><br/><span class="illustration">[img["https://features.hrw.org/features/features/encryption/assets/9_Scene.jpg"]]</span><p class="text">
The government is also interested in investigating what happened. It serves a warrant on the company that owns her messaging app, compelling the company to provide any information in its possession about some of the protesters.
Law enforcement isn’t able to access Fei’s messages because she was careful only to use end-to-end encrypted messaging to discuss the protest. The company doesn’t have access to the encrypted messages that the government requests.
<div><span class="back-button">[[< BACK|3Day3-7a]]</span><p class="button">[[CONTINUE|3Day3-Summary3A]]</p></div>
</p>